Cryptography Reference
In-Depth Information
(a)
(b)
(c)
(d)
(e)
(f)
(g)
FIGURE 7.10
(See color insert.) Results of Step 3 of Algorithm 8 with respect to P
m
where
Eycrypt cVCRG (P
m
, m, 3) was based upon Algorithm 4: (a)R
m
1
, (b)R
m
2
,
(c)R
m
3
; (d)R
m
1
R
m
2
, (e)R
m
1
R
m
3
, (f)R
m
2
R
m
3
; (g)R
m
1
R
m
2
R
m
3
.
Search WWH ::
Custom Search